A Trusted Channel Authentication System Based on Protecting Sensitive Data of Disappeared Members

An authentication system and sensitive data technology, applied in the transmission system, digital data protection, electronic digital data processing, etc., can solve the problems of sensitive data leakage of disappearing users, insufficient protection mechanism, etc., and achieve the effect of avoiding data theft

Active Publication Date: 2021-10-29
GLOBALTOUR GROUP LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the system's protection mechanism for members is not perfect, especially the sensitive data of disappearing users has a great risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Channel Authentication System Based on Protecting Sensitive Data of Disappeared Members
  • A Trusted Channel Authentication System Based on Protecting Sensitive Data of Disappeared Members
  • A Trusted Channel Authentication System Based on Protecting Sensitive Data of Disappeared Members

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment provides a trusted channel authentication system based on protecting sensitive data of vanishing members, including a member management module, a data management module, a trusted authentication module and a sensitive identification module, and the member management module is used to save basic information of members And judge whether the member disappears, the data management module is used to save the data information of the member, the trusted authentication module is used to obtain the data information of the member and perform credible authentication, and the sensitive identification module is used to verify the data information Sensitivity identification of the data items in;

[0031] The member management module monitors the activity of each member, and the calculation formula of the activity H is:

[0032] ;

[0033] Among them, T i Indicates the time interval from the last ith login system to the current time, t i Indicates the activity dur...

Embodiment 2

[0044] This embodiment includes all the content of Embodiment 1, combined withfigure 1 , this embodiment provides a trusted channel authentication system based on protecting sensitive data of vanished members, including a member management module, a data management module, a trusted authentication module and a sensitive identification module, the member management module is used to store basic member information , the data management module is used to store data information of members, the trusted authentication module is used to obtain data information of corresponding members and perform credible authentication, and the sensitive identification module is used to verify the data in the data management module carry out sensitivity identification;

[0045] The system also includes a user client. The user client is used for user registration and login. After a new user registers, the basic information of the new member is generated in the member management module. After the new u...

Embodiment 3

[0057] This embodiment includes all the content of the above-mentioned embodiments. The data storage code in this embodiment is generated by the data management module, stored in the member management module, and used to search for corresponding members after being acquired by the trusted authentication module. The data, the data storage code is encrypted and protected by encryption technology when circulating in the above three modules;

[0058] combine Figure 4 , the data management module generates a verification code after the member uploads the data information for the first time, and the verification code and the first address of the stored data information are combined into a first encryption code, and the first encryption code is sent to the member management module and combined with The ID information of the corresponding member synthesizes a second encrypted code, and the member search unit of the trusted authentication module obtains the second encrypted code and u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted channel authentication system based on protecting the sensitive data of vanished members, including a member management module, a data management module, a trusted authentication module and a sensitive identification module, the member management module is used to save the basic information of members and To judge whether a member disappears, the data management module is used to save the data information of the member, the trusted authentication module is used to obtain the data information of the member and perform credible authentication, and the sensitive identification module is used to check the data information of the member Sensitivity identification of data items. The trusted authentication module adopts an encryption protection mechanism when acquiring data, obtains the data storage code from the member management module as a credential for obtaining data from the data management module, and protects the sensitive data of the disappearing user, On the premise of ensuring the trusted authentication function, the user's data security is protected.

Description

technical field [0001] The invention relates to the technical field of trusted authentication, in particular to a trusted channel authentication system based on protecting sensitive data of extinct members. Background technique [0002] Mutual trust is the premise of communication between social objects and the foundation of stable social development. At present, many systems provide third-party services with credible certification, which reduces a lot of investigation costs for each object, but these systems also have the risk of leaking security and privacy. risk. [0003] Many trusted channel authentication systems have been developed now. After a lot of searching and reference, we found that the existing authentication systems are like the systems disclosed in the publication numbers KR101483895B1, KR101488627B1, CN102801524B and KR101740391B1. The system includes four modules, namely A trusted authentication module based on combined public key CPK identification authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/60G06F21/62
CPCH04L63/08H04L63/0428G06F21/602G06F21/6245
Inventor 张卫平张浩宇张思琪米小武
Owner GLOBALTOUR GROUP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products